[php-maint] Processed: Fixed in NMU of php5 5.1.4-0.1
Debian Bug Tracking System
owner at bugs.debian.org
Tue Jun 13 22:34:23 UTC 2006
Processing commands for control at bugs.debian.org:
> tag 359907 + fixed
Bug#359907: Security: Binary safety issue in html_entity_decode() may leak memory
Tags were: security
Tags added: fixed
> tag 361914 + fixed
Bug#361914: [CVE-2006-0996] phpinfo() Cross Site Scripting
Tags were: security
Tags added: fixed
> tag 361915 + fixed
Bug#361915: [CVE-2006-1608] copy() Safe Mode Bypass
Tags were: security
Tags added: fixed
> tag 361916 + fixed
Bug#361916: [CVE-2006-1494] tempnam() open_basedir bypass
Tags were: security
Tags added: fixed
> tag 361917 + fixed
Bug#361917: [CVE-2006-1549] PHP allows local users to cause a crash by defining and executing a recursive function.
Tags were: security
Tags added: fixed
> tag 365312 + fixed
Bug#365312: CVE-2006-1990/CVE-2006-1991: Security vulnerabilities in php
Tags were: security
Tags added: fixed
> tag 366109 + fixed
Bug#366109: php5: PHP 5.1.3, 5.1.4 released
There were no tags set.
Tags added: fixed
> tag 368595 + fixed
Bug#368595: php5: CVE-2006-1014 and CVE-2006-1015: argument injection in mb_send_mail function
Tags were: security
Tags added: fixed
> quit
Stopping processing here.
Please contact me if you need assistance.
Debian bug tracking system administrator
(administrator, Debian Bugs database)
More information about the pkg-php-maint
mailing list